| The Intelligent Transport System(ITS)is a new type of service system that integrates communication technology,sensor technology,image processing and other technological methods.Based on the information sharing between vehicles and the other traffic participants(Vehicle to Everything,V2X),the Internet of Vehicles can fully guarantee traffic safety and improve transportation efficiency.However,in traffic and transportation,the traffic topology changes rapidly and the vehicles move at high speed,and the safety communication between vehicles is more likely to be destroyed.To protect the network from malicious attackers,a more secure,faster and more effective security authentication mechanism is needed.Before we proposing a security protection strategy,it is necessary to analyze the security of the LTE-V2X system and summarize the malicious behavior by network attackers.Starting from the standard process of the 3GPP specification,this article extracts the core functional entities of the network,refines the interaction process between the user equipment and the base station.By injecting malicious behaviors in the normal process,we observe the affection on normal nodes and whether malicious nodes successfully access,and then analyze the security vulnerabilities in the process,finally,six new attack models against the LTE-V2X communication network will be proposed.The actual threat capability of the attack model is verified in the following text.Blockchain is a security database with the kinds of decentralization,openness and transparency,anti-tampering,anti-double-spending,etc.,and it is suitable for security authentication in high-speed mobile scenarios with a large number of traffic participants.In order to ensure that the base stations deployed by operators have more permission and control the tampering of security certificates by malicious nodes,this paper uses the Consortium Blockchain,which has greater flexibility and controllability during the process of consensus.At the same time,we consider of the unreliable channel and the privacy leakage caused by the plain text transmission of the authentication process.Referring to the idea of zeroknowledge authentication,the user equipment and the base station perform a three-way handshake and use a one-way function to exchange information.The authentication is completed without exposing the relevant information about the security certificate.Whats more,distributed storage of authentication signatures effectively reduces computational overhead,and the system has a higher processing efficiency.In order to verify the harmfulness of the proposed attack model and evaluate the performance of the designed protection scheme,this paper builds a co-simulation platform consisting of Veins Platooning platform and Blockchain network,which supports vehicle platooning based on LTEV2X communication technology and mining block in blockchain network.By analyzing the communication performance and traffic parameters of the co-operating platooning,the threat ability of the proposed attack model is verified feasible.After putting the blockchain on LTE-V2X as a security authentication scheme,by analyzing the total response time and authentication capabilities of the system,it shows that the design scheme in this paper is more efficient and safer,and is more suitable for large-scale traffic scenarios. |